home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
OS/2 Arsenal
/
OS2 Arsenal v1.0 (Disc 2)(Arsenal Computer).ISO
/
os2_inet
/
progcsd.exe
/
AUTH_UNI.H
next >
Wrap
Text File
|
1992-11-12
|
4KB
|
94 lines
/********************************************************copyrite.xmc***/
/* */
/* Licensed Materials - Property of IBM */
/* */
/* This module is "Restricted Materials of IBM": */
/* Program Number: 5798RXW */
/* Program Name: IBM TCP/IP Version 1.2 for OS/2 */
/* (C) Copyright IBM Corporation. 1990, 1991. */
/* */
/* See IBM Copyright Instructions. */
/* */
/********************************************************copyrite.xmc***/
/*
* Sun RPC is a product of Sun Microsystems, Inc. and is provided for
* unrestricted use provided that this legend is included on all tape
* media and as a part of the software program in whole or part. Users
* may copy or modify Sun RPC without charge, but are not authorized
* to license or distribute it to anyone else except as part of a product or
* program developed by the user.
*
* SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
* WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
* PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
*
* Sun RPC is provided with no support and without any obligation on the
* part of Sun Microsystems, Inc. to assist in its use, correction,
* modification or enhancement.
*
* SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
* INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
* OR ANY PART THEREOF.
*
* In no event will Sun Microsystems, Inc. be liable for any lost revenue
* or profits or other special, indirect and consequential damages, even if
* Sun has been advised of the possibility of such damages.
*
* Sun Microsystems, Inc.
* 2550 Garcia Avenue
* Mountain View, California 94043
*/
/* @(#)auth_unix.h 1.1 86/02/03 SMI */
/*
* auth_unix.h, Protocol for UNIX style authentication parameters for RPC
*
* Copyright (C) 1984, Sun Microsystems, Inc.
*/
/*
* The system is very weak. The client uses no encryption for it
* credentials and only sends null verifiers. The server sends backs
* null verifiers or optionally a verifier that suggests a new short hand
* for the credentials.
*/
#ifndef INCL_RPC_AUTH_UNI_H
#define INCL_RPC_AUTH_UNI_H
#ifndef __32BIT__
#define _Packed
#define _Seg16
#define _Far16
#define _Cdecl
#endif
/* The machine name is part of a credential; it may not exceed 255 bytes */
#define MAX_MACHINE_NAME 255
/* gids compose part of a credential; there may not be more than 10 of them */
//#define NGRPS 8
#define NGRPS 30
/*
* Unix style credentials.
*/
_Packed struct authunix_parms {
u_long aup_time;
char * _Seg16 aup_machname;
short aup_uid;
short aup_gid;
u_short aup_len;
short * _Seg16 aup_gids;
};
extern bool_t _Far16 _Cdecl xdr_authunix_parms(XDR * _Seg16, struct authunix_parms * _Seg16);
/*
* If a response verifier has flavor AUTH_SHORT,
* then the body of the response verifier encapsulates the following structure;
* again it is serialized in the obvious fashion.
*/
struct short_hand_verf {
_Packed struct opaque_auth new_cred;
};
#endif